General

  • Target

    951f4d9711ec7696b21101b1a0501c61685a1566781fc6d79b21bf240db16f47

  • Size

    1.1MB

  • Sample

    240503-a9k6tsch79

  • MD5

    baf8bd66cdce08ca2c3c0423a31f60d9

  • SHA1

    adfb39b2f21930d9bb833e22dd7b38cd5299c7b4

  • SHA256

    951f4d9711ec7696b21101b1a0501c61685a1566781fc6d79b21bf240db16f47

  • SHA512

    7930490545975252f0fa4a5e432c0dfc832dbd83dc370ff66561ac5321b638ea14be2bcd9d6b72317f5161902a92081162c74d28dd961a5976e09148a6d4c2ad

  • SSDEEP

    24576:0sGywjsNDsxhg8oqJyKnd9CSYZqtHGY5RMzzoq50:d5TEhg8oqJyKb8ot1SzV0

Malware Config

Targets

    • Target

      951f4d9711ec7696b21101b1a0501c61685a1566781fc6d79b21bf240db16f47

    • Size

      1.1MB

    • MD5

      baf8bd66cdce08ca2c3c0423a31f60d9

    • SHA1

      adfb39b2f21930d9bb833e22dd7b38cd5299c7b4

    • SHA256

      951f4d9711ec7696b21101b1a0501c61685a1566781fc6d79b21bf240db16f47

    • SHA512

      7930490545975252f0fa4a5e432c0dfc832dbd83dc370ff66561ac5321b638ea14be2bcd9d6b72317f5161902a92081162c74d28dd961a5976e09148a6d4c2ad

    • SSDEEP

      24576:0sGywjsNDsxhg8oqJyKnd9CSYZqtHGY5RMzzoq50:d5TEhg8oqJyKb8ot1SzV0

    • Detects executables containing possible sandbox analysis VM usernames

    • UPX dump on OEP (original entry point)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks